However, the enterprise wide deployment of the script is not without problems: Here is an output example of running SpeculationControl: How to efficiently verify if new Windows protectionsĪfter Microsoft quickly released a set of security updates and software patches, confirming whether or not all endpoints were properly protected remained a challenge for system admins. As a result, Microsoft released a PowerShell module named SpeculationControl to verify if a local system had been properly updated. Part 2 focuses on remediation and validation. ![]() Part 1 will cover intelligence gathering and reporting. In this blog, we will show how Goverlan IT Automation can be used to drastically reduce the time to remediate the Meltdown and Spectre security risks for your Microsoft Windows machines. Since the disclosure of Meltdown and Spectre, Microsoft, Apple, Intel and AMD are racing to release patches to close the security holes. However, for most complex IT organizations with thousands of workstations and servers, the global deployment of the security patches in an expeditious and systematic fashion remains a real headache. Meltdown and Spectre potentially allow restricted memory to be read by a rogue process, thus exposing confidential data. This is a security risk that can’t be ignored. These are serious security flaws that can lead to a data breach. These vulnerabilities are deeply rooted in Intel x86 and some of the ARM-based microprocessors. 2018 has started with yet another bombshell: the announcement of a set of vulnerabilities, named Meltdown ( CVE-2017-5754) and Spectre ( CVE-2017-5753 / CVE-2017-5715).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |